pwnwithlove Profile Banner
pwnii Profile
pwnii

@pwnwithlove

Followers
3K
Following
3K
Media
42
Statuses
519

bug bounty lover, breaking stuff on @yeswehack & worldcuping 🇫🇷 at @Hacker0x01 || organizer of @esnhack, trying to keep hacking underground || CVE-2023-44352

ଘ(∩^o^)⊃━☆:・゚✧*:・゚✧✯♡❀
Joined November 2021
Don't wanna be here? Send us removal request.
@pwnwithlove
pwnii
1 year
today with @Brumens2 we received a 50,000€ reward for discovering a bug in a public program !! don't be shy, go hunt in public programs too.@yeswehack ʚ(。˃ ᵕ ˂ )ɞ
Tweet media one
56
26
468
@pwnwithlove
pwnii
4 days
just dropped a new article about my current way of setting up an android bug bounty lab ヾ(˶ᵔ ᗜ ᵔ˶) . it’s the setup I use myself, and I’ve found nice web bugs on android apps with nothing more than a rooted pixel, frida, and some traffic interception.
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
5
38
162
@grok
Grok
3 days
Join millions who have switched to Grok.
154
291
2K
@pwnwithlove
pwnii
4 days
RT @yeswehack: Want to hack mobile applications? 📱. We’ve just published the ultimate guide to building an Android #BugBounty lab with emul….
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
31
0
@pwnwithlove
pwnii
9 days
RT @yeswehack: In the latest #TalkiePwnii, @pwnwithlove takes on a Dojo challenge about predictable tokens & YAML deserialization in Python….
0
6
0
@pwnwithlove
pwnii
23 days
RT @albinowax: The whitepaper is live! Learn how to win the HTTP desync endgame. and why HTTP/1.1 needs to die:
Tweet card summary image
http1mustdie.com
Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now
0
250
0
@pwnwithlove
pwnii
29 days
RT @yeswehack: In the latest #TalkiePwnii, @pwnwithlove dives into Hex Color Palette, a Dojo challenge she created 🎨. From XXE exploitation….
0
9
0
@pwnwithlove
pwnii
2 months
in lxml <= 5.3.2 with libxml2 2.12.x, XXE using parameter entities was possible due to libxml2 behavior - allowing indirect overrides of local DTDs. this worked even without resolve_entities, since libxml2 expanded parameter entities anyway :). it didn���t really make noise since.
@yeswehack
YesWeHack ⠵
2 months
What happens when a Dojo challenge collides with a library update? 🔍. The Hex Color Palette challenge used to rely on a specific XXE flow – until lxml changed the rules. Find out why our latest Dojo report includes two different payloads and reports that leak the same flag via
Tweet media one
0
1
31
@pwnwithlove
pwnii
2 months
RT @yeswehack: Want to get more out of @CaidoIO for your #BugBounty workflow? There might be a surprise in the video. 🎁. In Part 2 of our….
0
11
0
@pwnwithlove
pwnii
2 months
RT @CristiVlad25: Good writing here by @yeswehack. When I get nostalgic on recon, I often 'dig' into the past using some variation of what'….
Tweet card summary image
yeswehack.com
Learn and leverage the lessons of internet history: on the merits of archive-based recon plus some useful commands and tools for performing these techniques.
0
22
0
@pwnwithlove
pwnii
2 months
RT @yeswehack: 📱 Want to pwn Android apps from the inside? Let’s talk about Drozer, one of the most powerful tools for Android app security….
0
30
0
@pwnwithlove
pwnii
2 months
RT @_k4non: なんか死ぬほど踊ったきがする.
0
1
0
@pwnwithlove
pwnii
3 months
RT @yeswehack: In the latest episode of #TalkiePwnii, @pwnwithlove analyses Ruby Treasure, a Dojo challenge by @Brumens2 💎. From regex bypa….
0
3
0
@pwnwithlove
pwnii
4 months
RT @yeswehack: Know much about finding and exploiting path traversal or arbitrary file read vulnerabilities? 🤔. Learn practical attacks lev….
Tweet card summary image
yeswehack.com
Know much about exploiting path traversal or arbitrary file read vulnerabilities? Learn some practical attacks for unearthing high impact, lucrative vulnerabilities.
0
9
0
@pwnwithlove
pwnii
5 months
i've made some android challenges - feel free to check them out if you're into that kind of stuff! they’re pretty rare in most CTFs :p. the last one is based on a real bug bounty I reported, and is linked to a real application I can control ;)
Tweet media one
@MidnightFlag
Midnight Flag CTF
5 months
🚨 QUALIFIERS ARE NOW OPEN! . Good luck to all the challengers, the CTF will close tomorrow at 8 P.M (Paris time). ➡️ Join the Insurrection right here:
0
5
26
@pwnwithlove
pwnii
5 months
RT @torproject: @Skyyyuh no idea.
0
46
0
@pwnwithlove
pwnii
5 months
RT @yeswehack: Curious to find out how @CaidoIO could fit into your #BugBounty workflow? 🐞. In this special episode of #TalkiePwnii, @pwnwi….
0
12
0
@pwnwithlove
pwnii
6 months
0
45
0
@pwnwithlove
pwnii
7 months
i’m doing videos about writeups, i hope you’ll enjoy! this one is about python format string injection, and you can find more on the youtube channel ٩(^ᗜ^)و.
@yeswehack
YesWeHack ⠵
7 months
Curious about the solution to our Xmas Dojo chall? 👀. Watch episode 3 of #TalkiePwnii for the breakdown & pro hacking tips! @pwnwithlove demonstrates how to exploit a Python format string injection using insecure exception handling 🐍. #BugBountyTips.
0
4
30
@pwnwithlove
pwnii
9 months
RT @yeswehack: 📱 Want to find bugs in Android apps? Android apps are often included in our scopes. Frequently overlooked, they offer some v….
0
16
0
@pwnwithlove
pwnii
9 months
a few weeks ago, I received an award for a critical vulnerability submitted on @yeswehack -- Path Traversal (CWE-22) (˵>ᗜ<˵)! !! . this thread is literally how I discovered this vulnerability :p
Tweet media one
@yeswehack
YesWeHack ⠵
9 months
Have you ever seen an HTTP response embedded directly in the body of your request?. Check out these tips to discover how and where to find (internal) path traversal vulnerabilities! 👇. #YesWeRHackers #BugBountyTips.
8
1
79